Category Archives: CIS 552

CIS 552 Lab 8 Auditing a Wireless Network and Planning for a Secure WLAN Implementation NEW

CIS 552 Lab 8 Auditing a Wireless Network and Planning for a Secure WLAN Implementation NEW

Check this A+ tutorial guideline at

http://www.assignmentcloud.com/cis-552-strayer/cis-552-lab-8-auditing-a-wireless-network-and-planning-for-a-secure-wlan-implementation-new

For more classes visit

http://www.assignmentcloud.com

CIS 552 Lab 8 Auditing a Wireless Network and Planning for a Secure WLAN Implementation NEW

CIS 552 Week 1 Discussion Question Penetration Testing in a Corporate Environment NEW

CIS 552 Week 1 Discussion Question Penetration Testing in a Corporate Environment NEW

Check this A+ tutorial guideline at

http://www.assignmentcloud.com/cis-552-strayer/cis-552-week-1-discussion-question-penetration-testing-in-a-corporate-environment-new

For more classes visit

http://www.assignmentcloud.com

CIS 552 Week 1 Discussion Question Penetration Testing in a Corporate Environment NEW

Imagine you are an information security manager. How would you consider utilizing penetration testing in a corporate environment? Are there situations in which you feel another technique is more appropriate? In a few sentences, describe the most important business areas and/or network infrastructure components that would be most and least beneficial to test. Recommend a website as a potential useful resource that outlines best practices for conducting an internal penetration test.

Share with your classmates and provide links to any useful resources you find.

Flesh out your thoughts and interact with your classmates. Post your initial response by Wednesday each week and then return on a couple of other days to see what’s going on with the discussions. The more you interact, the more you learn from your peers, and the more you share with them about what you know. You’ll also be showing your instructor what you’ve picked up.

CIS 552 Week 2 Discussion Question Hashing algorithms MD5 or SHA1 NEW

CIS 552 Week 2 Discussion Question Hashing algorithms MD5 or SHA1 NEW

Check this A+ tutorial guideline at

http://www.assignmentcloud.com/cis-552-strayer/cis-552-week-2-discussion-question-hashing-algorithms-md5-or-sha1-new

For more classes visit

http://www.assignmentcloud.com

CIS 552 Week 2 Discussion Question Hashing algorithms MD5 or SHA1 NEW

In your opinion which is the better hashing algorithm: MD5 or SHA1? What are the differences, strengths, and weaknesses of each?

Create a scenario in which each would be the more suitable method to secure data. Examine your own PC’s operating system. Are there any tools built in to verify MD5 or SHA1 checksums of downloaded software? If your PC’s operating system does not have any, what tools can you recommend?

• Flesh out your thoughts and interact with your classmates. Post your initial response by Wednesday each week and then return on a couple of other days to see what’s going on with the discussions.

• The more you interact, the more you learn from your peers, and the more you share with them about what you know.  You’ll also be showing your instructor what you’ve picked up.

CIS 552 Week 3 Lab 7 Analyzing Network Traffic to Create a Baseline Definition NEW

CIS 552 Week 3 Lab 7 Analyzing Network Traffic to Create a Baseline Definition NEW

Check this A+ tutorial guideline at

http://www.assignmentcloud.com/cis-552-strayer/cis-552-week-3-lab-7-analyzing-network-traffic-to-create-a-baseline-definition-new

For more classes visit

http://www.assignmentcloud.com

CIS 552 Week 3 Lab 7 Analyzing Network Traffic to Create a Baseline Definition NEW

CIS 552 Week 4 Discussion Question Port scanning tools NEW

CIS 552 Week 4 Discussion Question Port scanning tools NEW

Check this A+ tutorial guideline at

http://www.assignmentcloud.com/cis-552-strayer/cis-552-week-4-discussion-question-port-scanning-tools-new

For more classes visit

http://www.assignmentcloud.com

CIS 552 Week 4 Discussion Question Port scanning tools NEW

Use the Internet or the Strayer Library and research at least two commonly used port scanning tools. What is the greatest source of information that can be gained in the footprinting process? How are hackers able to obtain it? How can the gathered information assist when conducting a pentest? Compare and contrast footprinting and port scanning. Which do you believe is the more important step in the pentesting process? Share with your classmates and include links to any useful tutorials, websites, or videos you find.

• Flesh out your thoughts and interact with your classmates. Post your initial response by Wednesday each week and then return on a couple of other days to see what’s going on with the discussions. The more you interact, the more you learn from your peers, and the more you share with them about what you know. You’ll also be showing your instructor what you’ve picked up.

CIS 552 Week 4 Hacking Research Report NEW

CIS 552 Week 4 Hacking Research Report NEW

Check this A+ tutorial guideline at

http://www.assignmentcloud.com/cis-552-strayer/cis-552-week-4-hacking-research-report-new

For more classes visit

http://www.assignmentcloud.com

CIS 552 Week 4 Hacking Research Report NEW

CIS 552 Week 4 Lab 3 Assignment Data Gathering and Foot printing on a Targeted Website NEW

CIS 552 Week 4 Lab 3 Assignment Data Gathering and Foot printing on a Targeted Website NEW

Check this A+ tutorial guideline at

http://www.assignmentcloud.com/cis-552-strayer/cis-552-week-4-lab-3-assignment-data-gathering-and-foot-printing-on-a-targeted-website-newFor more classes visit

http://www.assignmentcloud.com

CIS 552 Week 4 Lab 3 Assignment Data Gathering and Foot printing on a Targeted Website NEW

CIS 552 Week 5 Discussion Question Creating unique passwords NEW

CIS 552 Week 5 Discussion Question Creating unique passwords NEW

Check this A+ tutorial guideline at

http://www.assignmentcloud.com/cis-552-strayer/cis-552-week-5-discussion-question-creating-unique-passwords-new

For more classes visit

http://www.assignmentcloud.com

CIS 552 Week 5 Discussion Question Creating unique passwords NEW

Cracking passwords has become easier due to the tools available, making the current password best-practices obsolete. What advice could you give anyone to create a unique password and to protect a password that is “non-traditional approach”? What online resources are available to test a user’s password? Are there password schemes that you can suggest for users to maintain strong passwords while using different ones for each site or application?

• Flesh out your thoughts and interact with your classmates. Post your initial response by Wednesday each week and then return on a couple of other days to see what’s going on with the discussions.  The more you interact, the more you learn from your peers, and the more you share with them about what you know.  You’ll also be showing your instructor what you’ve picked up.

CIS 552 Week 7 Discussion Ransomware NEW

CIS 552 Week 7 Discussion Ransomware NEW

Check this A+ tutorial guideline at

http://www.assignmentcloud.com/cis-552-strayer/cis-552-week-7-discussion-ransomware-new

For more classes visit

http://www.assignmentcloud.com

This week’s labs and reading focus on malware, viruses, worms, Trojans, and backdoors. Each threat is uniquely different, hence the importance of learning and understanding each threat and how to mitigate the risk.

Use the Internet or the Strayer Library to research recent ransomware attacks. Summarize an attack and describe how the attack was resolved. Describe the steps that can be taken to protect a PC against ransomware and determine if a particular OS is more secure against these types of attacks. Share a website or resource that shows how to mitigate ransomware attacks. Share with your classmates, and include links to any useful resource you find.

After reading a few of your classmate’s postings, reply to the ones from which you learned something new, or to which you have something to add. Remember to get in early and post often

CIS 552 Week 8 Discussion Question Kali Linux NEW

 

Check this A+ tutorial guideline at

http://www.assignmentcloud.com/cis-552-strayer/cis-552-week-8-discussion-question-kali-linux-new

For more classes visit

http://www.assignmentcloud.com

CIS 552 Week 8 Discussion Question Kali Linux NEW

Choose one tool from the top 25 listed and provide a history of the tool, its purpose, what OS it runs on, whether it is part of the Kali Linux distribution. What is the best approach to learn “new” tools used in pentesting? Provide a video or resource that can be shared with the class on learning Kali Linux.

• Flesh out your thoughts and interact with your classmates. Post your initial response by Wednesday each week and then return on a couple of other days to see what’s going on with the discussions. The more you interact, the more you learn from your peers, and the more you share with them about what you know. You’ll also be showing your instructor what you’ve picked up.